HomeSort by relevance Sort by last modified time
    Searched refs:cipher (Results 101 - 125 of 253) sorted by null

1 2 3 45 6 7 8 91011

  /external/openssl/ssl/
d1_enc.c 152 else if ( EVP_CIPHER_block_size(ds->cipher) > 1)
154 if (RAND_bytes(rec->input, EVP_CIPHER_block_size(ds->cipher)) <= 0)
184 bs=EVP_CIPHER_block_size(ds->cipher);
211 ds->buf_len, ds->cipher->key_len,
214 ds->cipher->iv_len);
216 for (i=0; i<ds->cipher->iv_len; i++) printf("%02X", ds->iv[i]);
  /external/openssl/crypto/asn1/
p5_pbev2.c 87 X509_ALGOR *PKCS5_pbe2_set(const EVP_CIPHER *cipher, int iter,
99 alg_nid = EVP_CIPHER_type(cipher);
116 if (EVP_CIPHER_iv_length(cipher) &&
117 RAND_pseudo_bytes(iv, EVP_CIPHER_iv_length(cipher)) < 0)
123 EVP_CipherInit_ex(&ctx, cipher, NULL, NULL, iv, 0);
154 EVP_CIPHER_key_length(cipher))) goto merr;
  /external/wpa_supplicant_6/wpa_supplicant/src/crypto/
crypto_openssl.c 261 const EVP_CIPHER *cipher; local
270 cipher = EVP_rc4();
277 cipher = EVP_aes_128_cbc();
280 cipher = EVP_aes_192_cbc();
283 cipher = EVP_aes_256_cbc();
293 cipher = EVP_des_ede3_cbc();
296 cipher = EVP_des_cbc();
301 cipher = EVP_rc2_ecb();
311 if (!EVP_EncryptInit_ex(&ctx->enc, cipher, NULL, NULL, NULL) ||
313 !EVP_EncryptInit_ex(&ctx->enc, cipher, NULL, key, iv))
    [all...]
aes_wrap.h 25 int __must_check aes_wrap(const u8 *kek, int n, const u8 *plain, u8 *cipher);
26 int __must_check aes_unwrap(const u8 *kek, int n, const u8 *cipher, u8 *plain);
  /dalvik/libcore/security/src/main/java/org/bouncycastle/crypto/signers/
ISO9796d2Signer.java 27 private AsymmetricBlockCipher cipher; field in class:ISO9796d2Signer
41 * @param cipher base cipher to use for signature creation/verification
46 AsymmetricBlockCipher cipher,
50 this.cipher = cipher;
83 * @param cipher cipher to use.
87 AsymmetricBlockCipher cipher,
90 this(cipher, digest, false)
    [all...]
PSSSigner.java 26 private AsymmetricBlockCipher cipher; field in class:PSSSigner
40 * @param cipher the assymetric cipher to use.
45 AsymmetricBlockCipher cipher,
49 this(cipher, digest, sLen, TRAILER_IMPLICIT);
53 AsymmetricBlockCipher cipher,
58 this.cipher = cipher;
89 cipher.init(forSigning, kParam);
180 byte[] b = cipher.processBlock(block, 0, block.length)
    [all...]
  /external/dropbear/libtomcrypt/src/modes/ctr/
ctr_encrypt.c 37 if ((err = cipher_is_valid(ctr->cipher)) != CRYPT_OK) {
54 if ((ctr->padlen == ctr->blocklen) && cipher_descriptor[ctr->cipher].accel_ctr_encrypt != NULL && (len >= (unsigned long)ctr->blocklen)) {
55 if ((err = cipher_descriptor[ctr->cipher].accel_ctr_encrypt(pt, ct, len/ctr->blocklen, ctr->ctr, ctr->mode, &ctr->key)) != CRYPT_OK) {
84 if ((err = cipher_descriptor[ctr->cipher].ecb_encrypt(ctr->ctr, ctr->pad, &ctr->key)) != CRYPT_OK) {
  /external/dropbear/libtomcrypt/src/modes/f8/
f8_encrypt.c 35 if ((err = cipher_is_valid(f8->cipher)) != CRYPT_OK) {
49 /* xor of IV, MIV and blockcnt == what goes into cipher */
55 if ((err = cipher_descriptor[f8->cipher].ecb_encrypt(f8->IV, f8->IV, &f8->key)) != CRYPT_OK) {
70 if ((err = cipher_descriptor[f8->cipher].ecb_encrypt(f8->IV, f8->IV, &f8->key)) != CRYPT_OK) {
82 /* xor of IV, MIV and blockcnt == what goes into cipher */
88 if ((err = cipher_descriptor[f8->cipher].ecb_encrypt(f8->IV, f8->IV, &f8->key)) != CRYPT_OK) {
  /external/openssl/crypto/pkcs7/
pk7_enc.c 71 PKCS7_cipher(PKCS7 *p7,EVP_CIPHER *cipher);
  /hardware/ti/wlan/wl1271/stad/src/Connection_Managment/
keyDerive.h 93 ECipherSuite cipher,
  /system/wlan/ti/sta_dk_4_0_4_32/common/src/core/rsn/inc/
keyDerive.h 94 cipherSuite_e cipher,
  /system/wlan/ti/wilink_6_1/stad/src/Connection_Managment/
keyDerive.h 93 ECipherSuite cipher,
  /external/openssl/crypto/evp/
openbsd_hw.c 130 static int dev_crypto_init_key(EVP_CIPHER_CTX *ctx,int cipher,
138 assert(ctx->cipher->iv_len <= MAX_HW_IV);
142 CDATA(ctx)->cipher=cipher;
170 assert((inl&(ctx->cipher->block_size-1)) == 0);
174 if(ctx->cipher->iv_len)
178 memcpy(lb,&in[cryp.len-ctx->cipher->iv_len],ctx->cipher->iv_len);
231 memcpy(ctx->iv,&out[cryp.len-ctx->cipher->iv_len],ctx->cipher->iv_len)
    [all...]
  /external/openssl/crypto/engine/
eng_cryptodev.c 82 static int cryptodev_max_iv(int cipher);
83 static int cryptodev_key_length_valid(int cipher, int len);
94 static int cryptodev_engine_ciphers(ENGINE *e, const EVP_CIPHER **cipher,
216 cryptodev_max_iv(int cipher)
221 if (ciphers[i].id == cipher)
233 cryptodev_key_length_valid(int cipher, int len)
238 if (ciphers[i].id == cipher)
278 sess.cipher = ciphers[i].id;
317 sess.cipher = 0;
393 if ((inl % ctx->cipher->block_size) != 0
439 int cipher; local
    [all...]
  /dalvik/libcore/crypto/src/main/java/javax/crypto/
SealedObject.java 39 * instance and encrypts it using a cryptographic cipher.
46 * object itself keeps track of the cipher and corresponding parameters.
70 * and sealing it using the specified cipher.
72 * The cipher must be fully initialized.
77 * the cipher to encrypt the object.
81 * if the specified cipher is a block cipher and the length of
85 * if the cipher is {@code null}.
87 public SealedObject(Serializable object, Cipher c)
103 // should be never thrown because the cipher
160 Cipher cipher = Cipher.getInstance(sealAlg); local
256 Cipher cipher = Cipher.getInstance(sealAlg, provider); local
    [all...]
  /dalvik/libcore/security/src/main/java/org/bouncycastle/jce/provider/
JDKDigestSignature.java 46 private AsymmetricBlockCipher cipher; field in class:JDKDigestSignature
53 AsymmetricBlockCipher cipher)
58 this.cipher = cipher;
74 cipher.init(false, param);
90 cipher.init(true, param);
131 return cipher.processBlock(bytes, 0, bytes.length);
156 sig = cipher.processBlock(sigBytes, 0, sigBytes.length);
  /external/dropbear/libtomcrypt/src/encauth/eax/
eax_decrypt_verify_memory.c 22 @param cipher The index of the cipher desired
37 int eax_decrypt_verify_memory(int cipher,
73 if ((err = eax_init(eax, cipher, key, keylen, nonce, noncelen, header, headerlen)) != CRYPT_OK) {
  /external/dropbear/libtomcrypt/src/encauth/ocb/
ocb_decrypt_verify_memory.c 22 @param cipher The index of the cipher desired
25 @param nonce The session nonce (length of the block size of the block cipher)
34 int ocb_decrypt_verify_memory(int cipher,
58 if ((err = ocb_init(ocb, cipher, key, keylen, nonce)) != CRYPT_OK) {
ocb_encrypt_authenticate_memory.c 22 @param cipher The index of the cipher desired
33 int ocb_encrypt_authenticate_memory(int cipher,
56 if ((err = ocb_init(ocb, cipher, key, keylen, nonce)) != CRYPT_OK) {
  /external/dropbear/libtomcrypt/src/hashes/chc/
chc.c 24 static int cipher_idx=UNDEFED_HASH, /* which cipher */
25 cipher_blocksize; /* blocksize of cipher */
38 Initialize the CHC state with a given cipher
39 @param cipher The index of the cipher you wish to bind
42 int chc_register(int cipher)
46 if ((err = cipher_is_valid(cipher)) != CRYPT_OK) {
51 kl = cipher_descriptor[cipher].block_length;
59 if ((err = cipher_descriptor[cipher].keysize(&kl)) != CRYPT_OK) {
63 if (kl != cipher_descriptor[cipher].block_length)
    [all...]
  /external/dropbear/libtomcrypt/src/mac/f9/
f9_memory_multi.c 23 @param cipher The index of the desired cipher
33 int f9_memory_multi(int cipher,
56 if ((err = f9_init(f9, cipher, key, keylen)) != CRYPT_OK) {
  /external/dropbear/libtomcrypt/src/mac/omac/
omac_memory_multi.c 23 @param cipher The index of the desired cipher
33 int omac_memory_multi(int cipher,
56 if ((err = omac_init(omac, cipher, key, keylen)) != CRYPT_OK) {
  /external/dropbear/libtomcrypt/src/mac/pmac/
pmac_memory_multi.c 23 @param cipher The index of the cipher desired
33 int pmac_memory_multi(int cipher,
55 if ((err = pmac_init(pmac, cipher, key, keylen)) != CRYPT_OK) {
  /external/dropbear/libtomcrypt/src/mac/xcbc/
xcbc_memory_multi.c 23 @param cipher The index of the desired cipher
33 int xcbc_memory_multi(int cipher,
56 if ((err = xcbc_init(xcbc, cipher, key, keylen)) != CRYPT_OK) {
  /external/wpa_supplicant/
aes_wrap.h 25 int aes_wrap(const u8 *kek, int n, const u8 *plain, u8 *cipher);
26 int aes_unwrap(const u8 *kek, int n, const u8 *cipher, u8 *plain);

Completed in 525 milliseconds

1 2 3 45 6 7 8 91011